Security Assignment
Supervised By
Dr Mohamed Abo Rizka
Prepared By
Saif Allah Mohamed Bakry
what is the difference between computer security &
information security & network security & cybersecurity?
Points of
differenc Computer security Cybersecurity
e
Cybersecurity is the practice of securing
Computer security is the
systems, networks, and programs
safeguarding of computer
systems and information against digital attacks. Cybersecurity
against danger, theft, and techniques include methods for
Definition unauthorized use. It is the
assisting and securing various digital
process of detecting and
avoiding unauthorized components. Unauthorized digital
computer usage on your access to networks, data, and computer
system.
systems
1. Application 1. Critical infrastructure security
Security 2. Application security
2. Internet Security
Types 3. Network security
3. Endpoint Security
4. mobile device 4. Cloud security
security 5. Internet of Things (IoT) security
Provides security from
Scope Provides security from external threats
internal threats
To ensure electronic data is
To ensure integrity, confidentiality, and
not attacked, stolen, or
Goal availability of data within an
compromised by cyber
organization
thieves
2|Page
Points of
Information security Network Security
difference
It helps to safeguard data
It safeguards data as it
Data against unauthorized users,
travels across the network
access, and modification
It is a subcategory both for It is a subset of cyber
Part of
cyber and network security security
Information security applies to It protects anything in the
Protection
all types of information network realm
It is concerned with the
It is concerned with the
Attack protection of data from any
prevention of DOS attacks
type of threat
It protects against
unauthorized access, Network Security takes
Scope
modification of disclosure, and action against trojans
disruption
It ensures confidentiality, It provides security over
Usage
integrity, and accessibility the network only
It is concerned with
information assets as well as It protects data sent across
Deals with
their integrity, confidentiality, the network by terminals
and availability.
3|Page